top of page

What Blacklist Violations can we resolve?

  • Blacklist Email (e.g., Virus or Malware or Ransomware, etc Emails spread)

  • Blacklist URL (e.g, Virus or Malware or Ransomware Websites spread)

  • Application (e.g., Forbidden Applications access)

  • Ports (e.g., Forbidden Ports access)

  • Server (e.g., Forbidden Servers access)

  • Client (e.g., Forbidden Clients allow to access Internet or Data Center Resources)

  • Flow (e.g., Forbidden Flow between Application Server/Client connections)

Where can we monitor for Blacklist violations?

  • Monitoring Laptop/Desktop accessing the Internet

  • Monitoring Laptop/Desktop accessing the Wireless

How do we monitor your Blacklist violations? 

 We monitor the Outgoing Internet traffic by having the MacroProbe TAP into the spanned switch port or TAP into
    the Wireless Router. 

  We monitor the following Blacklist metrics:

  • Blacklist Email (SMTP, IMAP4, POP3)

  • DNS URL

  • HTTP URL

  • Conversation Flow

What MacroProbe features do we use to monitor your Blacklist violations?

  • Big Governance Monitor

  • BOTNET Monitor

  • Big DDOS Monitor

  • Big Cyberattack Monitor

  • DDOS Monitor

  • Blacklist Monitor

  • CyberIntel Ai

  • DDOS Anomaly Detection

  • BOTNET Anomaly Detection

  • Blacklist Anomaly Detection

  • Remote Hacking Anomaly Detection

  • DDOS Forecast

  • BOTNET Forecast

  • Blacklist Forecast

  • Remote Hacking Forecast

Blacklist Deployments:

TAP - WAP.jpg

Wireless Monitoring

Internet Monitoring

bottom of page